Cycldek

  • First known sample

    2013
  • Discovery

    2013
  • Current status

    Active
  • Type

    APT
  • Targeted platforms

    Windows
  • TOP targeted countries

    Thailand , Vietnam
CYCLDEK

More about the Cycldek group, its tactics, techniques, procedures and tools

Learn more
  • The way of propagation

    Exploits , USB drives , Phishing emails
  • Purpose/Functions

    Cyberespionage
  • Special features

    Using a new malware known as USB culprit, Cycldek is able to bridge air-gapped networks. However, there is most likely a human element involved in deploying the malware.

  • Targets

    Diplomatic organizations/embassies , Government entities
  • Artefacts/Attribution

    Chinese-speaking

  • Description

    Also known as Goblin Panda and Conimes, this threat actor was first discovered in 2013 and primarily focuses on conducting cyberespionage campaigns against high-profile targets in Southeast Asia, including large organizations and government entities. Post 2018, the group has primarily spread its malicious payload via phishing emails that contain a politically-themed RTF document. Cycldek utilizes a wide toolset consisting of several proprietary tools, including malware known as USBCulprit, which allows them to infect air-gapped devices. 

     

    Additional information